APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    • Cyber Security
    Editor's Pick (1 - 4 of 8)
    left
    IAM May Help Secure Data, But It Needs to be Protected as Well

    Marc Ashworth, Chief Information Security Officer, First Bank

    The Changing Landscape of Cyber Security

    Scott Brandt, CIO & Director of IT, Texas Office of the Secretary of State

    Leadership Framework for Building Elite Teams

    Douglas Duncan, CIO, Columbia Insurance Group

    Four Cybersecurity Weak Spots You Should Care About When Others Don't

    Marc Probst, CIO & VP, Intermountain Healthcare

    Enterprise Security And The Elusive

    Andre' Allen, CISO, City of Houston

    Secure Text Messaging in an Academic Medical Center - Experience and Lessons

    Kari Cassel, SVP & CIO, UF Health

    It's Time to Turn Security Inside Out

    Gilad Raz, CIO, Varonis

    Top 3 Challenges Growing Businesses Face and How the Cloud Can Help

    Ken Shulman, CIO & CTO, Broadview Networks

    right

    Cyber Security - Integrated enterprise approach required to address the multifaceted challenges

    Sumit Puri, CIO, Max Healthcare

    Tweet
    content-image

    Sumit Puri, CIO, Max Healthcare

    Data is the new oil in today’s hyper connected world and considering the increased mobility and significant volume of personal health information available with healthcare providers, it is imperative for the providers to have effective data security mechanisms in place.

    As per a recent Global study by IBM Security and Ponemon Institute on cost of data breach in 2018, it was found that the average total cost of a data breach is becoming quite significant. The average cost for each lost or stolen record (per capita cost) and the average size of known data breaches, all increased above the 2017 report averages. The average total cost rose from $3.62 to $3.86 million, an increase of 6.4 percent, the average cost for each lost record rose from $141 to $148, an increase of 4.8 percent and the average size of the data breaches increased by 2.2 percent.

    With cybersecurity attacks growing at an increasing rate, and system vulnerabilities frequently being discovered, it is evident that healthcare cybersecurity threats are not going away. Unfortunately, there were several damaging data breaches in past few years in healthcare industry with the ransomware attack of WannaCry which brought down NHS hospital services in UK for several hours as a case in point. The recent proliferation of anonymous hackers and cryptocurrency coin miners are a stark reminder that not only is the volume of attacks increasing, their range is expanding and so is the risk of them significantly damaging healthcare delivery. Cybercriminals are applying their creative skills to breach defences through increasingly advanced and sophisticated attacks.

    Security concerns over smart devices including internet connected hospital medical equipment have increased over the past few years. A case in point is former Vice president of US, Dick Cheney who revealed he'd been warned his defibrillator could be used to assassinate him with hackers trying to manipulate the same. And that's why Abbott (formerly St. Jude Medical) recalled some 350,000 implantable defibrillators in May 2018 to help protect patients from any assassination attempts or other cyber security issues. This follows a similar recall of 465,000 pacemakers done by Abbott in 2017 to upgrade their firmware and install security fixes.

    As medical devices become increasingly interconnected via the internet, hospital networks, other medical devices, and smartphones, there is an increased risk of exploitation of cybersecurity vulnerabilities. According to a recent Ponemon Institute study, 80 percent of device-makers and healthcare delivery organizations rate the level of difficulty in securing medical devices as very high. Meanwhile, 67 percent of device manufacturers and 56 percent of healthcare organizations are expecting a security breach of a device over the next 12 months.

    According to one 2018 study, device phishing attacks are up 85 percent, with the increasing amount of data collected by every site and app visited on your mobile device.

    Presently, with advanced technology, a sophisticated hacker may hijack a healthcare supplier’s domain and direct traffic to another infected domain with some other spurious messages.

    When an attacker attempts to directly compromise the software of a supplier, it is a particularly difficult attack to defend against. Once the software is infected, it is signed with the manufacturer's certificate, meaning any receiving systems checking for valid certificates may potentially become exposed. Attackers may also choose to target cloud-hosting services. Websites associated with the host may become infected and spread that infection to other organizations along the supply chain.

    Because healthcare has such high exposure to third-party services and business partnerships, it faces a high degree of exposure to these kinds of attacks. There is growing recognition in the healthcare industry on the importance of protecting patient data which is the bedrock of enhancing trust and patient safety. In order to help and meet these significant challenges, healthcare organizations should view cybersecurity as a business risk rather than just a technical challenge and address security issues at the board level on a continual basis. This recognition signals a shift to a larger business level transformation with progressive organizations moving from a narrower, compliance and HIPAA focused approach to a more comprehensive enterprise level data security strategy.

    The key steps to enable an integrated security strategy can be as follows–

    1) Socialise the risks and inform users - As per most reports, while most large enterprises are fairly well covered on perimeter and network security, internal data breaches from employees are the weakest link in enterprise security. There is an ongoing need to educate employees across the organization to be cyber aware and provide training according to their roles and responsibilities. Online user-friendly modules on security aspects with annual enrolment of all employees shall be beneficial to help everyone understand the key dos and don’ts and socialise associated perils of potential cyber security breaches.

    2) Hire right personnel and build integrated team with adequate business participation - Focus on hiring and retaining qualified IT security staff who can work with nominated representatives of key business functions to protect sensitive data. It is recommended to nominate a senior business or compliance representative as a Chief Data protection officer to ensure dedicated focus on potential data security risks. Within IT function, there is also a need to share security standards with suppliers and consider security implications when purchasing medical equipment, IT hardware, or software.

    3) Monitor emerging security threats and buy necessary tools to protect the enterprise – It is imperative that ongoing security threats are monitored carefully and wherever necessary, requisite tools for data loss prevention, end point monitoring and encryption, advanced threat prevention etc. are procured to reduce organisational risk.

    4) Strengthen data security policies and set up integrated Incident response team – In spite of best efforts from security team, there will be instances of occasional security breaches and /or zero day attacks. Hence it is important to form integrated incident management teams and strengthen cybersecurity incident response protocols with the data security team being empowered to seamlessly work with users, IT infrastructure and application vendor teams in a boundary less manner.

    5) Set up Security Governance framework to assess and manage internal security preparedness – Unless we measure security aspects, it is difficult to manage the risks. It is therefore critical that IT teams speak business language to share potential security risks and scientifically compute ROI on IT security investments. It is also important to create an IT Security metrics framework with metrics on data patching status, anti-virus compliance, penetration and vulnerability threats especially for external internet facing sites, level of data breaches reported, coverage of internal employee awareness trainings, compliance status etc. These metrics should be reviewed at least monthly to drive better understanding of security preparedness, compliance and progress at an enterprise level.

    Organizations that incorporate steps such as these into their overall cybersecurity frameworks shall be best positioned to successfully navigate the challenges that await. Some of these suggested practices will help facilitate a security culture and develop an agile, comprehensive and effective cybersecurity posture for the healthcare community.

    In conclusion, it is essential to increase organisation wide awareness and raise the emerging security risks at board level, to remain vigilant and continue to layer new forms of cyber security protection to prevent your network from exposure to cybersecurity threats.
    tag

    Data Security

    ROI

    Weekly Brief

    loading
    Top 10 Cyber Security Companies in APAC - 2024
    ON THE DECK

    Cyber Security 2024

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Artificial Intelligence - Myths And Truths

    Artificial Intelligence - Myths And Truths

    Geraldo Pereira Junior, Chief Information Officer, Ypê
    Sustainable Future through Innovative Technology Solutions

    Sustainable Future through Innovative Technology Solutions

    Faisal Parvez, Director, BT Business CIO
    The Future Relies on Augmented AI

    The Future Relies on Augmented AI

    Laurent Fresnel, CIO, The Star Entertainment Group
    Digitalization with the use of digital technologies/Improving business through digital technologies

    Digitalization with the use of digital technologies/Improving business through digital technologies

    Wilbertus Darmadi, CIO, Toyota Astra Motor
    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    How Marco's Pizza Leaned On Technology To Succeed Amid The Pandemic By Quickly Pivoting To Contact-Free Delivery And Curbside Carryout

    Rick Stanbridge, VP & Chief Information Officer, Marco’s Pizza
    Bunnings  Diy Digital Transformation

    Bunnings Diy Digital Transformation

    Leah Balter, Chief Information Officer, Bunnings
    For a Smarter City: Trust the Data, Ignore the Hype

    For a Smarter City: Trust the Data, Ignore the Hype

    Brad Dunkle, Deputy CIO, City of Charlotte
    Smart Community Innovation for the Post Pandemic

    Smart Community Innovation for the Post Pandemic

    Harry Meier, Deputy Cio for Innovation, Department of Innovation and Technology, City of Mesa
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://cyber-security.apacciooutlook.com/ciospeaks/cyber-security-integrated-enterprise-approach-required-to-address-the-multifaceted-challenges-nwid-6699.html